Web Application Firewall (WAF) RSA ® Conference 2013.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Akamai DNS Offerings RSA © Conference ©2013 AKAMAI | FASTER FORWARD TM Akamai DNS Solutions Enhanced DNS (eDNS) Scalable, outsourced, DNS solution.
Protecting Commercial and Government Web Sites: The Role of Content Delivery Networks Bruce Maggs VP for Research, Akamai Technologies.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Barracuda Web Application Firewall
System and Network Security Practices COEN 351 E-Commerce Security.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Chapter 6: Packet Filtering
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
Module 7: Advanced Application and Web Filtering.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Module 10: Windows Firewall and Caching Fundamentals.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Kona Security Solutions - Overview
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
TMG Client Protection 6NPS – Session 7.
Web Application Protection Against Hackers and Vulnerabilities
Securing Your Web Application in Azure with a WAF
Chapter 7: Identifying Advanced Attacks
Enabling Secure Internet Access with TMG
Real-time protection for web sites and web apps against ATTACKS
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
CloudFront: Living on the Edge
Introduction to Networking
Configuring TMG as a Firewall
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Lecture 3: Secure Network Architecture
Firewalls.
Firewalls Chapter 8.
Presentation transcript:

Web Application Firewall (WAF) RSA ® Conference 2013

©2013 AKAMAI | FASTER FORWARD TM The Cybercrime Landscape in 2013 Attacks have become more sophisticated... …and easier to carry out Source: hackmageddon.com/ …industry agnostic...

©2013 AKAMAI | FASTER FORWARD TM Moving From Network to Application Layer Target of Traditional DDoS Attacks Network Layer (Layers 3/4) Application Layer (Layer 7) Where increasing number of attacks are focused

©2013 AKAMAI | FASTER FORWARD TM Web Application Firewall Highlights Operates at the network edge – over 100,000 servers Inspects requests and responses for malicious content and info leakage Inspects packets to protect against attacks such as SQL Injections & Cross-Site Scripts Configurable to log or block activities against policy Protects organizations against application layer attacks propagated via HTTP and HTTPS Enables compliance with PCI DSS 1.2 section 6.6 Provides advanced rate controls (behavioral based protections) Propagates quickly (~30 minutes) Configured via portal

©2013 AKAMAI | FASTER FORWARD TM Kona Security Solutions 2.0 ModSecurity Rule Update Core Rule Set Legacy CRS support Akamai Common Rules Based on Akamai’s unique view 20 – 25% of internet traffic Advanced Rate Controls Session-ID; Client-IP+User-Agent Rule Upgrade Wizard

©2013 AKAMAI | FASTER FORWARD TM

Appendix & Details

©2013 AKAMAI | FASTER FORWARD TM Akamai Intelligent Platform™ Deflecting Network Layer Attacks at the Edge Network Layer attack mitigation  Built-in protection is “always on”  Only Port 80 (HTTP) or Port 443 (HTTPS) traffic allowed on Platform o All other traffic dropped at the Akamai Edge Attack traffic never makes it onto Platform Customer not charged for traffic dropped at Edge o Absorbs attack requests without requiring identification o Requires CNAME onto Akamai Intelligent Platform Absorbs attacks through massive scale  ~5.5 Tbps average throughput; up to 8Tbps  Distribution of HTTP request traffic across 100,000+ servers; 1,100+ networks  No re-routing, added latency, or point of failure Examples of attacks types dropped at Akamai Edge  UDP Fragments  ICMP Floods  SYN Floods  ACK Floods  RESET Floods  UDP Floods

©2013 AKAMAI | FASTER FORWARD TM Custom Rules Web Application Firewall Description  WAF Custom Rules implemented in Akamai metadata written by Akamai Professional Services  Rules are created and managed in customer portal  Rules are then associated with firewall policies and deployed with WAF in 45 minutes The Result  New rule logic can be built to handle specific use cases for the customer  Rules can be built that execute when one or more baseline rules or rate control rules match  Output of application vulnerability products can be implemented as “virtual patches”  Advanced piping to user validation actions can be achieved (prioritization)

©2013 AKAMAI | FASTER FORWARD TM Custom Rules Web Application Firewall Description  WAF Custom Rules implemented in Akamai metadata written by Akamai Professional Services  Rules are created and managed in customer portal  Rules are then associated with firewall policies and deployed with WAF in 45 minutes The Result  New rule logic can be built to handle specific use cases for the customer  Rules can be built that execute when one or more baseline rules or rate control rules match  Output of application vulnerability products can be implemented as “virtual patches”  Advanced piping to user validation actions can be achieved (prioritization)

©2013 AKAMAI | FASTER FORWARD TM Adaptive Rate Controls Malicious Behavior Detection  Specify number of requests per second against a given URL o Controls requests based on behavior pattern – not request structure Use client IP address, session ID, cookies, etc.  Configure rate categories to control request rates against digital properties Mitigate rate-based DDoS attacks  Statistics collected for 3 request phases o Client Request – Client to Akamai Server o Forward Request – Akamai Server to Origin o Forward Response – Origin to Akamai Server  Statistics collected allow us to ignore large proxies and pick out a malicious user hiding behind a proxy  Statistics collected allow for detection of pathological behavior by a client o Request rate is excessive for any stage o Requests causing too many Origin errors

©2013 AKAMAI | FASTER FORWARD TM Adaptive Rate Controls Malicious Behavior Detection  Specify number of requests per second against a given URL o Controls requests based on behavior pattern – not request structure Use client IP address, session ID, cookies, etc.  Configure rate categories to control request rates against digital properties Mitigate rate-based DDoS attacks  Statistics collected for 3 request phases o Client Request – Client to Akamai Server o Forward Request – Akamai Server to Origin o Forward Response – Origin to Akamai Server  Statistics collected allow us to ignore large proxies and pick out a malicious user hiding behind a proxy  Statistics collected allow for detection of pathological behavior by a client o Request rate is excessive for any stage o Requests causing too many Origin errors

©2013 AKAMAI | FASTER FORWARD TM Security Monitor (1 of 3) Timeline of Requests by Hour Visual Display of Requests by Geography Requests by WAF Message Requests by WAF Tag Requests by WAF Rule ID

©2013 AKAMAI | FASTER FORWARD TM Security Monitor (2 of 3) Multiple ways to display request statistics

©2013 AKAMAI | FASTER FORWARD TM Security Monitor (3 of 3) Requests by Client IP address Requests by City ARLs being attacked

©2013 AKAMAI | FASTER FORWARD TM